Maldev-Academy / CodeSearchDemo
☆38Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for CodeSearchDemo
- Construct the payload at runtime using an array of offsets☆58Updated 4 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆83Updated 8 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated last month
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆84Updated 7 months ago
- Do some DLL SideLoading magic☆74Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆81Updated 6 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 10 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- Create Anti-Copy DRM Malware☆42Updated 2 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆53Updated 6 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆58Updated 2 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆45Updated 6 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆52Updated 9 months ago
- A bunch of scripts and code i wrote.☆130Updated this week
- ☆118Updated last year
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆54Updated 2 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆117Updated 2 months ago
- A set of programs for analyzing common vulnerabilities in COM☆152Updated 2 months ago
- Red Team Operation's Defense Evasion Technique.☆51Updated 5 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆40Updated 10 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆75Updated last week
- ☆71Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year